Input validation vulnerability in VideoJS (5 plugins affected)

The S3 Video, EasySqueezePage, External “Video for Everybody”, Videopack, and 1player plugins for WordPress have an issue that might allow unauthenticated attackers to inject malicious code into pages. This is because the plugins use a vulnerable version of VideoJS and don’t properly filter user input or properly escape output. If a user is tricked into clicking on a link, the malicious code would then execute.

Detected in:

EasySqueezePage fixed vulnerable versions: >= * <= *
External "Video for Everybody" fixed vulnerable versions: >= * < 2.1
Videopack fixed vulnerable versions: >= * < 4.1
1player open vulnerable versions: >= * < 1.4
S3 Video Plugin open vulnerable versions: >= * < 0.98

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.